Please complete the form below and a TrainUp.com support specialist will send you information on the course you've selected. Our staff typically responds to your requests within 30 minutes or less. You can also reach us toll-free at 1-866-540-9677

When an organization's web servers are attacked, valuable information can be exposed. A web server attack may include data theft, or web site defacement, but can also pose threats to other servers or services. In this course we look at how hackers attack web servers, the tools they use, and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Learning Objectives

Identify reasons why web servers are often compromised

Differentiate between different types of web server attacks

Recognize web server identification tools

Identify precautionary steps to take to protect against web server attacks

Sequence the steps you would perform to complete a penetration test on your web servers

Identify web server hacking techniques and countermeasures against them

Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the consequences of social engineering and how to prevent it. This course is the eight in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Denial-of-service attacks reduce, restrict or prevent legitimate use of a computer's resources. Session hijacking is an attack where an attacker takes over a valid computer session between two computers. In this course, we look at denial of service and session hijacking attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the ninth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Learning Objectives

Identify permanent denial-of-service attacks

Identify hardware botnet tools

Identify which type of filtering defends against botnets and DDoS

Match the type of session hijacking attack to its characteristics

Identify application-level hijacking attacks

Identify true statements about IPSec

Identify the characteristics of and countermeasures to denial-of-service and session hijacking attacks

Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, and what countermeasures are available. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course we look at malware, how it is created, the attack vectors, and what countermeasures are available. This course is the sixth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Learning Objectives

Recognize techniques for getting trojans to evade antivirus software

Match the trojan to its type

Identify the purpose of specific trojans

Identify the tools used to detect trojans by scanning for suspicious open ports

Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and techniques used, protocols that can be spoofed and countermeasures and penetration testing. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the seventh in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.